{"id":250,"date":"2025-12-03T22:41:34","date_gmt":"2025-12-03T22:41:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ids493fall25\/?page_id=250"},"modified":"2025-12-04T00:29:35","modified_gmt":"2025-12-04T00:29:35","slug":"cyber-works","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ids493fall25\/cyber-works\/","title":{"rendered":"Cyber Works"},"content":{"rendered":"\n<p>Below, I have attached papers that best display my cyber knowledge throughout my time at ODU studying cybersecurity. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Policy Analysis Paper<\/h2>\n\n\n\n<p><strong>Policy Analysis Paper&nbsp;<\/strong><\/p>\n\n\n\n<p>Isaas Lozada&nbsp;<\/p>\n\n\n\n<p>CYSE 425W&nbsp;<\/p>\n\n\n\n<p>Dr.Mehr&nbsp;<\/p>\n\n\n\n<p>9\/21\/25<\/p>\n\n\n\n<p>A Cybersecurity policy is the foundation of a company\u2019s defense strategy against outside threats like malicious hackers or even internal threats such as an employee. This policy that is put into practice is best to protect an organization\u2019s digital information from being corrupted or intercepted. Some examples of extreme damage from these attacks could result in monetary loss, legal battles, damage to reputation, and even bankruptcy. The reason these policies exist in the workplace is to set a standard. Everyone at the company must adhere to these rules and follow them to the exact detail, this ensures equal fault amongst all employees. These policies establish clear guidelines not only to ensure protection of internal security but these policies also promote an organization&#8217;s commitment to cybersecurity. Customers, Business owners, investors, they all pay attention to how a company protects their crucial digital information, having that safety net of a policy in place boosts trust within a company.&nbsp;<\/p>\n\n\n\n<p>Many times these policies cover a range of topics, some examples would include how to properly \u201cBring your own device\u201d or guidelines on how employees can spot and avoid threats. However, some policies require grave attention, these policies are referred to as \u201cStand Alone\u201d policies. A \u201cStand Alone\u201d policy that is essential to a company\u2019s success and absolutely required would be the \u201cIncident Response\u201d policy. This policy details all the right moves for a company to make when responding,reporting, or responding to a cyber threat. This policy also details how a company should properly report and also document what occurred during that \u201cincident\u201d.&nbsp;<\/p>\n\n\n\n<p>This policy is extremely important because it acts as an umbrella in terms of defense, against several disasters that could occur to a company. A prime example of a threat that would be encountered during the &#8220;incident&#8221; phase would be Ransomware. Ransomware is a malicious malware that would hold a company\u2019s computer \u201chostage\u201d until they provide a ransom. IBM reported that twenty percent of all network attacks were a direct use of ransomware, this data solidified that Ransomware is a real threat and amongst the most popular rising attacks used in recent times.&nbsp;<\/p>\n\n\n\n<p>Social engineering is also a huge threat that is covered under the incident response policy. The most prominent threat under social engineering is known as \u201cPhishing\u201d. Phish attacks are usually an impersonation of a trusted individual by a hacker with the intent of manipulating an employee into leaking sensitive information, downloading malware, and even transfer of financials. The Incident Response policy is put in place to halt these attacks. A typical incident Response policy has four main steps, those steps are detection, reporting, response, and documentation.&nbsp;<\/p>\n\n\n\n<p>The first step being detection is crucial, this step identifies the threat and what exactly is being attacked. Directly after identifying the threat, the threat must be reported to the response team, these reports include where the attack happened and the specific time. This is the \u201cresponse\u201d portion of the defense strategy, the response team will identify the threat and then rapidly work on neutralizing the threat. After neutralizing the threat, the final step is to document what had occurred during the incident. The documentation should report all findings and serve as a guide to instruct the proper strategies that should be used for current attacks as well as future attacks.<\/p>\n\n\n\n<p><strong>References&nbsp;<\/strong><\/p>\n\n\n\n<p><em>NIKE, Inc. 10-K Cybersecurity GRC &#8211; 2024-07-25<\/em>. (2024, July 25).&nbsp;Board-Cybersecurity.com.&nbsp;https:\/\/www.board-cybersecurity.com\/annual-reports\/tracker\/20240725-nike-inc-cybersecurit y-10k\/&nbsp;<\/p>\n\n\n\n<p>Wadhwa, P. (2023, December 10). <em>Why is Cyber Incident Reporting Important? (Complete Process)<\/em>. Sprinto. https:\/\/sprinto.com\/blog\/cybersecurity-incident-reporting\/&nbsp;Fortinet. (2025). <em>What Is Incident Response? Process &amp; 6 Step Plan<\/em>. Fortinet. https:\/\/www.fortinet.com\/resources\/cyberglossary\/incident-response<\/p>\n\n\n\n<p>Fortinet. (2025). What Is Incident Response? Process &amp; 6 Step Plan. Fortinet.<br>https:\/\/www.fortinet.com\/resources\/cyberglossary\/incident-response<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">An Analysis On The Political Effects Of A Policy Paper <\/h2>\n\n\n\n<p><strong>Political Effects On A Policy Analysis Paper&nbsp;<\/strong><\/p>\n\n\n\n<p>Isaas Lozada&nbsp;<\/p>\n\n\n\n<p>CYSE 425W&nbsp;<\/p>\n\n\n\n<p>Dr.Mehr&nbsp;<\/p>\n\n\n\n<p>9\/21\/25<\/p>\n\n\n\n<p>Incident response policy is an organization\u2019s number one defense strategy when it comes to technical documents that regard a cyber crisis. All business organizations must have an incident response policy, it is not a choice but a requirement. However, this strategy often drags more attention than needed, these policies have deep political foundations rooted within them. An incident response policy is a political document. The policy always forces decisions that deal with power, blame, money and communication.&nbsp;<\/p>\n\n\n\n<p>The first and most crucial step to an incident response policy is to establish who is the head of the table, who calls the \u201cshots\u201d at the top of the chain of command. This portion of the policy starts the &#8220;hierarchy&#8221; process for an organization. When an organization appoints a head of command, they typically refer to high intelligence positions that are known as a \u201cCISO\u201d. A CISO stands for Chief Information Security Officer, these positions are the pinnacle of trust at the senior executive level. They usually have the highest form of authority over all departments, they also deal with changes of leadership across departments as well. These decisions can lead to conflict, they make real time changes that may ruffle the feathers of other executives. These decisions usually create a political \u201cminefield\u201d that the CISO has to navigate through to ensure that the right changes are being made without creating division.&nbsp;<\/p>\n\n\n\n<p>The CISO has the most power and that comes with a lot of responsibility. The CISO analyzes the entire incident at hand and determines how to properly defend against current cyber threats and future threats. During the investigation process the CISO must determine who was at \u201cfault\u201d. This accountability that the CISO has to follow through with is not only stressful but also extremely political. The accusation of a department at fault never runs over smoothly, some departments may use the policy&#8217;s language as a tool or scapegoat to push the blame onto others. This makes the investigation process for a CISO extremely difficult due to the political influence that \u201cclouds\u201d over the analysis.&nbsp;<\/p>\n\n\n\n<p>Incident Response policy\u2019s political nature does not just halt after dictating who was at fault. The policy also has to deal with the financial aspect of an incident that an organization faces as well. The budget after an incident for repairs, legal fees, fines, and even forensic consultants all contribute to the political background of an Incident Response policy. The policy must determine where a majority of all the funds are allocated within an organization. This can cause division because other departments may find anger with the decision, causing a conflict between the IT leadership and Financial leadership. Typically, every department head will argue their beliefs on why their department should receive the most funds over other departments. Prioritization is the solution that the incident response policy enforces when these hardships arise. This portion of the incident response policy is extremely political because it enforces the necessity of each department, which always results in the political priorities of one department over another.<\/p>\n\n\n\n<p><strong>References&nbsp;<\/strong><\/p>\n\n\n\n<p>Cybersecurity and Infrastructure Security Agency. (2023). <em>Cybersecurity Incident Response | CISA<\/em>. Cybersecurity and Infrastructure Security Agency CISA. https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\/organizations-and-cyber-safety\/cybersecurity-incident-response&nbsp;<\/p>\n\n\n\n<p><em>Policies &amp; Priorities<\/em>. (n.d.). Www.cio.gov.&nbsp;<\/p>\n\n\n\n<p>https:\/\/www.cio.gov\/policies-and-priorities\/cybersecurity\/&nbsp;<em>Cyber Incident Reporting: A Unified Message for Reporting to the Federal Government<\/em>. (2016, July 28). Department of Homeland Security. https:\/\/www.dhs.gov\/publication\/cyber-incident-reporting-unified-message-reporting-federal-government<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">A Paper On The Social Implications Of Security Awareness Training<\/h2>\n\n\n\n<p><strong>The Social Implications Of&nbsp;Security Awareness Training&nbsp;<\/strong><\/p>\n\n\n\n<p>Isaas Lozada<\/p>\n\n\n\n<p>Old Dominion University<\/p>\n\n\n\n<p>CYSE 425W<\/p>\n\n\n\n<p>Dr.Mehr<\/p>\n\n\n\n<p>12\/1\/25&nbsp;<\/p>\n\n\n\n<p><strong>The Social Implications Of&nbsp; Security Awareness Training<\/strong><\/p>\n\n\n\n<p>Current society\u2019s cybersecurity has transformed from what was once considered a &#8220;technical&#8221; problem into a social vulnerability. The core factor behind the development of strategies like Security Awareness Training is that hackers target employees, not just the technology. The best way to break into an established network is by taking advantage of human trust through phishing attacks and social engineering (Spitzner, 2023). This is solid evidence that lapses in the human element is the core source as to why security breaches required a shift in policy, transitioning away from a strictly technical defense and towards methods that directly address human behavior. However, the success of this strategy is entirely dependent on the social culture and behaviour demonstrated within a company.<\/p>\n\n\n\n<p>Implementing a Security Awareness Training policy can also come with extreme social consequences. The results will rely on the execution of the policy, either generating a positive culture of encouragement or a negative culture based on fear. If a company\u2019s mindset is one that focuses directly on punishment, the policy will have detrimental social consequences. Realistic phishing scenarios will be viewed as shameful exercises, and employees that fail will be made to feel embarrassed. This will certainly develop a culture that is based on terror and secrecy, which will cause employees to stash their mistakes to avoid fault, allowing hackers to remain inside the network for a longer duration than necessary (Karyda, 2007). In contrast, if the policy is intended as a tool for support and education, it generates a positive and influential social culture of encouragement, turning employees from vulnerabilities into a driven \u201chuman firewall.\u201d<\/p>\n\n\n\n<p>The assessment of this policy\u2019s societal impact is based on my Cybersecurity Culture Maturity Model, which evaluates how a company\u2019s security culture molds the policy\u2019s effectiveness. The model\u2019s levels are Clueless, Compliant, Security-Aware, and Security Resilient. Each level represents where a company\u2019s culture should be categorized. A company that falls under the \u201cCompliant\u201d level is one where the policy has little importance and is viewed as a \u201cchore\u201d for compliance.&nbsp; On the other hand, a company that values the policy to establish a sense of a unified duty to defend, will have its culture leap to the \u201csecurity-aware\u201d level with the goal of becoming \u201cSecurity Resilient,\u201d where security is a shared priority across the company, not just a chore to complete (Collard et al., 2024).<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Level<\/td><td>Maturity&nbsp;<\/td><td>Culture Outlook<\/td><td>Behavior of Employee<\/td><\/tr><tr><td>1<\/td><td>Clueless<\/td><td>Security is strictly viewed as a responsibility of the IT Department. No training across departments.&nbsp;<\/td><td>Employees have no knowledge of threats, constant failure to phishing attacks, and do not report suspicious activity.&nbsp;<\/td><\/tr><tr><td>2<\/td><td>Compliant<\/td><td>Security known as a compliance issue. Training is an annual event conducted just to meet regulations.&nbsp;<\/td><td>Employees view security training as a boring task. Follow general rules but do not proactively defend.&nbsp;<\/td><\/tr><tr><td>3<\/td><td>Security Conscious<\/td><td>The majority of employees understand cyber vulnerabilities. The training program is regular and reports are encouraged.<\/td><td>The majority of employees can identify phishing attacks and are more likely to report mistakes or suspicious activity.<\/td><\/tr><tr><td>4<\/td><td>Security Resilient&nbsp;<\/td><td>Security is a top priority within the company. All employees understand the duty of defending the company.<\/td><td>Employees work with the security team often. Possess a proactive mindset against threats and report intelligent attacks.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>At its core, the main ethical and social implication is that these realistic phishing scenarios require a company to intentionally deceive their own employees. The assessment must strictly be used as an instrument for positively educating instead of chastising. The metrics utilized by management must not create an environment based on terror, the strategy will be completely useless. The Security Awareness Training policy\u2019s success will not be gauged by a technical calculation but by a social quantification. The policy will be an unfiltered representation of support, honesty, and a unified purpose of defending the company.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Collard, A., Colbert, M., Gillet, J., Huisman, J. G., &amp; Kron, E. (2024, November 1). <em>2024 phishing attack landscape and benchmarking the data you need to know<\/em>. https:\/\/www.knowbe4.com\/. <a href=\"https:\/\/www.knowbe4.com\/hubfs\/final_2024_phishing_benchmark_report.pdf?hsLang=en\">https:\/\/www.knowbe4.com\/hubfs\/final_2024_phishing_benchmark_report.pdf?hsLang=en<\/a><\/p>\n\n\n\n<p>Karyda, M. (2007, September 18). <em>Fostering Information Security Culture In Organizations: A Research Agenda<\/em>. https:\/\/files.core.ac.uk\/. <a href=\"https:\/\/core.ac.uk\/download\/pdf\/301373754.pdf\">https:\/\/core.ac.uk\/download\/pdf\/301373754.pdf<\/a><\/p>\n\n\n\n<p>Spitzner, L. (2023, July 25). <em>Sans 2023 security awareness report: Managing human risk<\/em>. SANS Institute. <a href=\"https:\/\/www.sans.org\/blog\/sans-2023-security-awareness-report-managing-human-risk\">https:\/\/www.sans.org\/blog\/sans-2023-security-awareness-report-managing-human-risk<\/a><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Analyzing The Impact Of A Security Awareness Training Program On An Organization<\/h2>\n\n\n\n<p><strong>Assessing The Impact Of A Security Awareness Training Program&nbsp;<\/strong><\/p>\n\n\n\n<p>Isaas Lozada&nbsp;<\/p>\n\n\n\n<p>Old Dominion University&nbsp;<\/p>\n\n\n\n<p>CYSE 425W&nbsp;<\/p>\n\n\n\n<p>Dr.Mehr&nbsp;<\/p>\n\n\n\n<p>11\/30\/25<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Assessing The Impact Of A Security Awareness Training Program&nbsp;<\/strong><\/p>\n\n\n\n<p>In order to gauge the strength of a Security Awareness Training program, I created an evaluation model known as a Cybersecurity Culture Maturity Model. The model will help a company understand where it currently ranks and where the areas of improvement are needed. The model below displays four levels of maturity.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Level&nbsp;<\/td><td>Maturity&nbsp;<\/td><td>Culture Outlook&nbsp;<\/td><td>Behavior of&nbsp;Employee<\/td><\/tr><tr><td>1&nbsp;<\/td><td>Clueless&nbsp;<\/td><td>Security is strictly viewed as a&nbsp;responsibility of the IT Department. No training across&nbsp;departments.<\/td><td>Employees have no knowledge of threats, constant failure to phishing attacks, and do not report&nbsp;suspicious activity.<\/td><\/tr><tr><td>2&nbsp;<\/td><td>Compliant&nbsp;<\/td><td>Security known as a compliance issue.&nbsp;Training is an annual event conducted just to meet regulations.<\/td><td>Employees view&nbsp;security training as a boring task. Follow general rules but do not proactively&nbsp;defend.<\/td><\/tr><tr><td>3&nbsp;<\/td><td>Security Conscious&nbsp;<\/td><td>The majority of&nbsp;employees&nbsp;understand cyber&nbsp;vulnerabilities. The training program is regular and reports are encouraged.<\/td><td>The majority of&nbsp;employees can&nbsp;identify phishing&nbsp;attacks and are more likely to report&nbsp;mistakes or&nbsp;suspicious activity.<\/td><\/tr><tr><td>4&nbsp;<\/td><td>Security Resilient&nbsp;<\/td><td>Security is a top&nbsp;priority within the company. All&nbsp;employees&nbsp;understand the duty of defending the&nbsp;company.<\/td><td>Employees work with the security team&nbsp;often. Possess a&nbsp;proactive mindset&nbsp;against threats and report intelligent&nbsp;attacks.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>A Security Awareness Training program is the strongest cybersecurity policy, because it is the only strategy that targets the lapses of the human element. However, for a strategy to be deemed \u201ceffective\u201d, it must be measured by its success. The strength of a security awareness program can be audited by using a two part approach that combines quantitative metrics with a qualitative framework that I have created known as the \u201cCybersecurity Culture Maturity Model\u201d. This evaluation is not only about identifying a single number. It is solid proof that a program is proactively changing employee behavior and bolstering the company\u2019s security culture over time.&nbsp;<\/p>\n\n\n\n<p>We must first understand how experts gauge these policies. In scholarly and industry reports, the assessment directly focuses on multiple data-driven metrics. Experts at top organizations like the SANS institute advise to track the phishing simulation click rate, which is the percentage of employees who fail when tested during a simulated phishing attack (Spitzner, 2023). Another essential metric is the employee report rate. How frequently are employees reporting malicious emails? A valid program will display the click rate depleting over time while the reporting rate improves drastically. The metrics will provide a definite, numerical proof that employees are understanding how to spot attacks and are becoming proactive participants in defending the company\u2019s assets (Collard et al., 2024).&nbsp;<\/p>\n\n\n\n<p>My own assessment will use these industry certified metrics as the foundation, but the assessment will also involve these metrics into my Cybersecurity Culture Maturity Model. The model will provide the exact context for what the numbers actually represent. My model has four tiers: Clueless, Compliant, Security-Aware, and Security Resilient. The quantitative data is what creates the place for a company on this model. A high click rate paired with a low report rate indicates that an organization is at Tier 1, \u201cClueless.\u201d With improvement of the metrics, an organization can provide solid proof that their company is elevating up to the &#8220;compliant\u201d tier in pursuit of the \u201cSecurity-Aware\u201d tier.\u00a0\u00a0<\/p>\n\n\n\n<p>When gauging the effectiveness of this strategy, we must account for the social, ethical, and political implications. The main challenge with ethics is that the phishing scenarios must actively trick your own employees. That is why the analysis must be used as a tool for empowering not punishing employees. If these metrics are used by the company to punish employees or departments, it will breed a culture that revolves around fear and secrecy, where employees stash their faults (Karyda, 2007). The evaluation must be used as a tool for positivity and educational function.&nbsp;<\/p>\n\n\n\n<p>This evaluation would perfectly produce success. The assessment would provide leadership with the exact results that they want to see reflected. Leadership wants to identify that metrics show a return on investment and a crystal clear model that displays total improvement in the organization&#8217;s security hygiene. This program is not just used to check a box for compliance,&nbsp;<\/p>\n\n\n\n<p>it is viewed as an investment that reduces the organization&#8217;s human risk. This is the perfect gauge to assess the impact of the strategy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>References&nbsp;<\/strong><\/p>\n\n\n\n<p>Collard, A., Colbert, M., Gillet, J., Huisman, J. G., &amp; Kron, E. (2024, November 1). <em>2024 phishing attack landscape and benchmarking the data you need to know<\/em>.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.knowbe4.com\/.\">https:\/\/www.knowbe4.com\/.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.knowbe4.com\/hubfs\/final_2024_phishing_benchmark_report.pdf?hsLang=en\">https:\/\/www.knowbe4.com\/hubfs\/final_2024_phishing_benchmark_report.pdf?hsLang=en<\/a><\/p>\n\n\n\n<p>Karyda, M. (2007, September 18). <em>Fostering Information Security Culture In Organizations: A Research Agenda<\/em>. https:\/\/files.core.ac.uk\/.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/core.ac.uk\/download\/pdf\/301373754.pdf\">https:\/\/core.ac.uk\/download\/pdf\/301373754.pdf<\/a><\/p>\n\n\n\n<p>Spitzner, L. (2023, July 25). <em>Sans 2023 security awareness report: Managing human risk<\/em>. SANS Institute.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/blog\/sans-2023-security-awareness-report-managing-human-risk\">https:\/\/www.sans.org\/blog\/sans-2023-security-awareness-report-managing-human-risk<\/a><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">How\u00a0Cybersecurity strategies And policies Shape Organizational Culture\u00a0And How\u00a0Generative AI Influences This Relationship<\/h2>\n\n\n\n<p><strong>How Security Awareness Training Creates The Human Firewall<\/strong><\/p>\n\n\n\n<p>Isaas Lozada<\/p>\n\n\n\n<p>Old Dominion University<\/p>\n\n\n\n<p>CYSE 425W<\/p>\n\n\n\n<p>Dr.Mehr<\/p>\n\n\n\n<p>11\/28\/25&nbsp;<\/p>\n\n\n\n<p><strong>Abstract<\/strong><\/p>\n\n\n\n<p>Cybersecurity is no longer a technical problem, it has become a human problem. This paper argues that a company\u2019s security culture is the most important factor for its entire defense and that the culture is dependent on how well shaped their cybersecurity strategy is. After a complete analysis of multiple strategies, the most effective policy identified would be continuous Security Awareness Training to ensure a strong, secure culture. The primary reason is that the strategy targets the \u201chuman element\u201d lapses directly, transforming employees with liabilities into a proactive \u201chuman firewall\u201d. This paper will break down how the strategy will influence behavior in a positive manner and also improve the security posture of an organization. Furthermore, it will also explore the role of Generative AI (GenAI) and its effects on making training programs more realistic, personalized and effective. The final conclusion is that a current security awareness program paired with the power of GenAI, is the strongest tool available for building the adaptable company culture needed to face the strongest threats of today\u2019s cyberworld.<\/p>\n\n\n\n<p><strong>How Security Awareness Training Creates The Human Firewall&nbsp;&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<p>Today\u2019s world has made one thing clear about the cybersecurity landscape, technical defenses like firewall and antivirus programs are simply not enough. Hackers have found out that the easiest way to infiltrate a secure network is not by breaking down \u201cdigital\u201d walls, but by misleading an employee on the inside into opening the door. Social engineering, Phishing, and human error are now the main culprit of successful cyberattacks (Spitzner, 2023). This is cemented proof that cybersecurity is no longer a technical problem, but now a human problem. This is where a company\u2019s cyber culture becomes their most important weapon in their arsenal of defense (Whitman, 2003).<\/p>\n\n\n\n<p>The strongest cybersecurity culture is one where every member of the organization, from the CEO down to the interns, understands their role and importance in defending the company\u2019s assets (Enisa, 2017). It is a unified mindset where secure behavior is not only automatic but the top priority. However, this pristine culture is not just created overnight. It is the direct result of the practice of cybersecurity strategies and policies put in place by the organization. A policy that is hard to understand or solely focused on punishment will create a culture of fear and secrets, where employees will stash their mistakes (Karyda, 2007). However, a policy that is clear, supports employees, and prioritizes education can create a culture of empowerment, where employees are encouraged to report potential cyber threats. This paper will detail why a modern, continuous Security Awareness Training program is the \u201ckey\u201d strategy for building a robust positive security culture. It will also explore the new role that Generative (GenAI) has in making this strategy even stronger than ever before.<\/p>\n\n\n\n<p>The main focus of this paper is the strategy that is Security Awareness Training. What comes to mind when people most think of this term, is a boring PowerPoint presentation that is presented on a random day annually. Most people have no interest in the presentation and click through the slides as fast as possible in order to check a box for compliance. That is not the gold standard for an effective program.<\/p>\n\n\n\n<p><strong>Security Awareness Training&nbsp;<\/strong><\/p>\n\n\n\n<p>A strong and effective Security Awareness Training program is a continuous and adaptive fight to educate employees about new cyber threats that they must face and motivate them to defend against new attacks. The central goal is not just to instruct employees on information, but to rewire their defensive behavior. The main components of the program always include phishing simulations to audit employees, short and attractive training units on topics like data handling and password security, and simple reporting procedures for when suspicious activity is identified. A valid program is not a one time event, it is an ongoing mindset that is integrated into the daily life of a company.&nbsp;<\/p>\n\n\n\n<p>Security Awareness Training is without a doubt the best strategy for bolstering a company\u2019s cybersecurity culture. The reason behind this is that the strategy directly targets the \u201chuman firewall.\u201d Other strategies like \u201cZero Trust\u201d are crucial, but these technical policies operate on the back end. The only strategy that engages every single employee is Security Awareness Training, this strategy ensures that every employee is actively participating in defending the company.&nbsp;<\/p>\n\n\n\n<p>Security Awareness Training completely changes the narrative from \u201cblame\u201d to a culture of ownership. A great training program does not fault employees for clicking on a malicious link during a simulation. Instead, the program uses that moment to build and teach upon, providing non-judgemental feedback that teaches the employee how to identify the signs of an attack. This will create a culture where employees who believe they have made a mistake will feel encouraged to report it, which is the perfect culture. A culture of fear, would promote negativity, causing employees to hide their mistakes, allowing a hacker to create more damage the longer they are inside the network.<\/p>\n\n\n\n<p><strong>Analysis<\/strong><\/p>\n\n\n\n<p>This strategy builds a duty of a shared responsibility across the company\u2019s community. The training applies to every employee in the organization, it creates a clear motive that cybersecurity is not just the duty of the IT department. It is every employee\u2019s job. When the CEO must endure the same training as an entry-level employee, it creates a powerful, bonded culture. Where security is viewed as a core value of the organization rather than just a rule to obey. That is why the strategy is more effective at strengthening a culture in comparison to any other policy.<\/p>\n\n\n\n<p><strong>Role Of GenAI<\/strong><\/p>\n\n\n\n<p>Generative AI (GenAI) has the power to revolutionize Security Awareness Training, making it even more beneficial and powerful. GenAI can supercharge this strategy with the creation of highly realistic phishing simulations. Phishing tests were simple in the past, they were built on the foundations of easy to spot templates. Currently, hackers are using GenAI to create intelligent, personalized phishing emails that could fool most employees (Collard et al., 2024). The only way to teach employees on how to identify these attacks is to use the same technology. GenAI could be used by security teams to craft thousands of unique, personal phishing emails that are customized to specific departments or even selected employees to provide an intense realistic training scenario.&nbsp;<\/p>\n\n\n\n<p>GenAI also can provide a large contribution in creating personalized training modules. Instead of forcing all employees to watch the same basic videos, GenAI can generate training content immediately. If an employee from the finance department keeps failing phishing scenarios that use fake invoices, the GenAI system can create an interactive training test that focuses directly on that type of threat. Which makes the training even more refined and personalized for each employee.&nbsp;<\/p>\n\n\n\n<p>Finally, GenAI can also provide the ability to create interactive chatbots that act as a \u201csecurity helpdesk&#8221; readily available at all times. Employees who are not sure of a suspicious email can immediately refer to the chatbot for guidance, the chatbot will analyze the message and provide feedback on if the email is a malicious threat. This refines security with instant support, ensuring that security is even easier for employees.&nbsp;<\/p>\n\n\n\n<p><strong>Visualization&nbsp;<\/strong><\/p>\n\n\n\n<p>In order to gauge the strength of a Security Awareness Training program, I created an evaluation model known as a Cybersecurity Culture Maturity Model. The model will help a company understand where it currently ranks and where the areas of improvement are needed. The model below displays four levels of maturity.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Level<\/td><td>Maturity&nbsp;<\/td><td>Culture Outlook<\/td><td>Behavior of Employee<\/td><\/tr><tr><td>1<\/td><td>Clueless<\/td><td>Security is strictly viewed as a responsibility of the IT Department. No training across departments.&nbsp;<\/td><td>Employees have no knowledge of threats, constant failure to phishing attacks, and do not report suspicious activity.&nbsp;<\/td><\/tr><tr><td>2<\/td><td>Compliant<\/td><td>Security known as a compliance issue. Training is an annual event conducted just to meet regulations.&nbsp;<\/td><td>Employees view security training as a boring task. Follow general rules but do not proactively defend.&nbsp;<\/td><\/tr><tr><td>3<\/td><td>Security Conscious<\/td><td>The majority of employees understand cyber vulnerabilities. The training program is regular and reports are encouraged.<\/td><td>The majority of employees can identify phishing attacks and are more likely to report mistakes or suspicious activity.<\/td><\/tr><tr><td>4<\/td><td>Security Resilient&nbsp;<\/td><td>Security is a top priority within the company. All employees understand the duty of defending the company.<\/td><td>Employees work with the security team often. Possess a proactive mindset against threats and report intelligent attacks.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Data can be used to track the company\u2019s progress through these levels. An organization can measure how many employees fail realistic phishing scenarios, the number of malicious emails reported by employees, and the duration of time for a report made after a malicious mistake.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Ultimately, a company\u2019s security is only as powerful as its employees (Copas, 2015). Technical defenses will always be essential, but the most resilient security maturity is one that is built on a foundation powered by a proactive security culture. This paper has proven that the key to building this culture is through a continuous Security Awareness Training Program.&nbsp;<\/p>\n\n\n\n<p>This strategy enforces every employee of the company, transforming the employees from liabilities into a \u201chuman firewall.\u201d Unlike other policies, it crafts a culture that revolves around empowerment and a unified goal, which is much stronger than a culture that promotes fear. The strategy being &#8220;supercharged&#8221; with the assistance of Generative AI to generate customized training and realistic scenarios, only bolsters the defense of the company. The current cyber realm is growing with stronger evolving threats, creating a \u201chuman firewall\u201d is not just a concept, it is the best investment a company can make for its security\u2019s future.&nbsp;<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Collard, A., Colbert, M., Gillet, J., Huisman, J. G., &amp; Kron, E. (2024, November 1). <em>2024 phishing attack landscape and benchmarking the data you need to know<\/em>. https:\/\/www.knowbe4.com\/. <a href=\"https:\/\/www.knowbe4.com\/hubfs\/final_2024_phishing_benchmark_report.pdf?hsLang=en\">https:\/\/www.knowbe4.com\/hubfs\/final_2024_phishing_benchmark_report.pdf?hsLang=en<\/a><\/p>\n\n\n\n<p>Copas, D. (2015, May 11). <em>Presented to the Interdisciplinary Studies Program:<\/em>. https:\/\/scholarsbank.uoregon.edu\/. <a href=\"https:\/\/scholarsbank.uoregon.edu\/server\/api\/core\/bitstreams\/2dc00c24-bc64-4e31-8c83-1a40bd048f89\/content\">https:\/\/scholarsbank.uoregon.edu\/server\/api\/core\/bitstreams\/2dc00c24-bc64-4e31-8c83-1a40bd048f89\/content<\/a><\/p>\n\n\n\n<p>Enisa. (2017, November 4). <em>Cyber security culture in organisations &#8211; ENISA<\/em>. https:\/\/www.enisa.europa.eu\/. https:\/\/www.enisa.europa.eu\/sites\/default\/files\/publications\/WP2017 O-3-3-1 Cyber Security Cultures in Organizations.pdf<\/p>\n\n\n\n<p>Karyda, M. (2007, September 18). <em>Fostering Information Security Culture In Organizations: A Research Agenda<\/em>. https:\/\/files.core.ac.uk\/. <a href=\"https:\/\/core.ac.uk\/download\/pdf\/301373754.pdf\">https:\/\/core.ac.uk\/download\/pdf\/301373754.pdf<\/a><\/p>\n\n\n\n<p>Spitzner, L. (2023, July 25). <em>Sans 2023 security awareness report: Managing human risk<\/em>. SANS Institute. <a href=\"https:\/\/www.sans.org\/blog\/sans-2023-security-awareness-report-managing-human-risk\">https:\/\/www.sans.org\/blog\/sans-2023-security-awareness-report-managing-human-risk<\/a><\/p>\n\n\n\n<p>Whitman, M. E. (2003, August 16). <em>Enemy at the Gate: Threats to Information Security<\/em>. https:\/\/digitalcommons.kennesaw.edu\/. <a href=\"https:\/\/digitalcommons.kennesaw.edu\/cgi\/viewcontent.cgi?article=2421&amp;context=facpubs\">https:\/\/digitalcommons.kennesaw.edu\/cgi\/viewcontent.cgi?article=2421&amp;context=facpubs<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Below, I have attached papers that best display my cyber knowledge throughout my time at ODU studying cybersecurity. Policy Analysis Paper Policy Analysis Paper&nbsp; Isaas Lozada&nbsp; CYSE 425W&nbsp; Dr.Mehr&nbsp; 9\/21\/25 A Cybersecurity policy is the foundation of a company\u2019s defense strategy against outside threats like malicious hackers or even internal threats such as an employee&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ids493fall25\/cyber-works\/\">Read More<\/a><\/div>\n","protected":false},"author":15134,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages\/250"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/users\/15134"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages\/250\/revisions"}],"predecessor-version":[{"id":259,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages\/250\/revisions\/259"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/media?parent=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}